Blog
Healthcare Tracking Pixels and Patient Privacy: HIPAA Risks and How to Stay Compliant
Reduce HIPAA compliance risk from tracking pixels on healthcare sites. Learn controls, BAA requir...
Ambulatory Surgery Center Security Risk Assessment: Step-by-Step Guide and HIPAA Compliance Checklist
Follow HIPAA Security Rule guidance for surgery centers: complete SRAs, apply admin, physical and...
Are IP Addresses Considered PHI Under HIPAA? Explained
Definition of PHI Under HIPAA. Under the Health Insurance Portability and Accountability Act, Pr...
Electronic Medical Record (EMR) Policy Overview: A Practical Guide to Access, Security, and HIPAA Compliance
This Electronic Medical Record (EMR) policy overview translates complex regulations and security ...
Policy Management Software for Healthcare: Streamline Compliance, Training & Audits
Centralize Policy Documentation. Policy management software for healthcare gives you a single, s...
HIPAA Compliance Checklist for Small Practices
As a small health practice, you handle a lot of sensitive patient information. Following HIPAA gu...
When Can PHI Be Disclosed Without Consent?
HIPAA Privacy Rule. The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule...
Healthcare Risk Management Solutions to Strengthen Patient Safety and Compliance
Effective healthcare risk management solutions align clinical, operational, and regulatory priori...
What Are Patient Identifiers? Definition, Examples, and HIPAA’s 18 Identifiers
Definition of Patient Identifiers. Patient identifiers are data elements that single out, trace,...
HIPAA and PII Explained: What’s the Difference, Where They Overlap, and What’s Protected
Definition of PII and PHI. PII: Personally Identifiable Information. PII is any data that can i...
HIPAA‑Compliant Custom Software Development for Secure, Scalable Healthcare Apps
Ensuring HIPAA Compliance in Software Development. Building HIPAA‑compliant custom software star...
What Is a Security Risk Assessment (SRA)? Definition, Steps & Examples
A Security Risk Assessment (SRA) is a structured process for discovering what you must protect, w...
Policy Management Software for Healthcare: Simplify Compliance & Accreditation
Benefits of Policy Management Software. Policy management software for healthcare centralizes po...
What Is HIPAA Incidental Exposure? Definition, Examples, and How to Prevent It
Definition of Incidental Exposure. HIPAA incidental exposure refers to a limited, unavoidable di...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security